Eaton DS-VFI transformer
3:06
Eaton’s Cooper Power series Dual Source VFI (DS-VFI) transformer provides automatic source recovery, built-in overcurrent protection and grid automation schemes for the modern electrical distribution system. Designed for both main-main applications and loop-feed applications, the DS-VFI transformer combines state-of-the-art switchgear controls and automation with proven high-efficiency liquid-filled transformer technology into a single assembly. The solution enables complete medium-to low-voltage distribution protection and automatic outage restoration in a compact, cost-effective package.
Eaton’s Cooper Power series Dual Source VFI (DS-VFI) transformer provides automatic source recovery, built-in overcurrent protection and grid automation schemes for the modern electrical distribution system. Designed for both main-main applications and loop-feed applications, the DS-VFI transformer combines state-of-the-art switchgear controls and automation with proven high-efficiency liquid-filled transformer technology into a single assembly. The solution enables complete medium-to low-voltage distribution protection and automatic outage restoration in a compact, cost-effective package.
Cooper Power series Similar Videos
-
Surge protection considerations | Eaton PSEC
7:41
Surge protection devices (SPDs) safeguard equipment from damaging voltage transients also known as surges. Discover SPD types, proper installation, NEC requirements, and tips for effective protection in residential and industrial applications.
-
Reduced voltage soft starters (RVSS) explained | Eaton PSEC
8:51
A reduced voltage soft starter, or RVSS, is an electronic device used to start and control the speed of electric motors. RVSSs are designed to protect motors from sudden influxes in power by limiting inrush current associated with motor startup.
-
Industrial communication protocols explained | Eaton PSEC
12:23
Learn about industrial communication protocols such as Fieldbus, Ethernet, and wireless communications. Understand how they operate, their features, limitations, and cybersecurity standards.